The Uncomfortable Truth About Cyber Risk in 2026
Five things I'm seeing in the threat landscape that most security leaders aren't talking about enough.
I’ve been looking at threat data, regulatory updates, and claims patterns for the past few weeks. There’s a gap between what the industry is talking about and what’s actually happening on the ground. Here’s what’s keeping me up at night.
Your Vendors Are Softer Targets Than You Are
Third-party breaches doubled as a share of all incidents in 2025. Not up 10% or 20% — doubled. Attackers have figured out something many security teams still haven’t: it’s easier to compromise a vendor than a target directly.
The uncomfortable part? Most third-party risk programs I see are compliance theater. Questionnaires get filed, risk scores get calculated, and nothing changes. Meanwhile, your attack surface grows every time a vendor adds an integration, spins up a shadow cloud instance, or gets acquired by a company you’ve never heard of.
If you’re not continuously monitoring vendor domain exposure and certificate hygiene, you’re operating blind.
AI Social Engineering Crossed the Uncanny Valley
Remember when you could spot phishing by the grammar? Gone. Attackers are now deploying deepfake voice cloning, AI-generated phishing that adapts to your writing style, and real-time impersonation that fools trained security professionals.
A finance worker in Hong Kong transferred $25 million after a video call with what appeared to be the CFO. All AI-generated. The technology requires minimal technical skill now — open-source tools have democratized what was once state-actor territory.
Traditional security awareness training — once-a-year videos and simulated phishing — doesn’t work against adversaries who generate thousands of personalized lures in minutes.
The Regulatory Tsunami Is Actually Here
February 2026 was a watershed. NIS2 and DORA grace periods ended. The SEC’s cyber disclosure rules mean material incidents must be reported within four business days. DORA mandates 4-hour reporting for financial services.
Here’s what nobody admits: most organizations are approaching these regulations backwards. They’re retrofitting security documentation to satisfy auditors instead of building programs that naturally produce compliance evidence.
If you can’t show continuous monitoring, you can’t prove you’re compliant. Point-in-time assessments are dead.
Cyber Risk Quantification Is No Longer Optional
For years, security leaders struggled to answer the CEO’s question: “How much risk do we actually have, and what’s it worth?”
The FAIR model has moved from academic curiosity to enterprise standard. Boards want dollar-quantified risk exposure now. If you can’t translate vulnerability counts and threat intelligence into financial terms, you can’t prioritize investments or justify budgets.
The organizations winning at this aren’t necessarily spending more — they’re spending smarter because they know which risks actually matter.
You Have More Exposed Assets Than You Think
The average enterprise has thousands of exposed assets they don’t know about. Forgotten subdomains. Orphaned cloud instances. APIs that were supposed to be internal. Developer credentials in public repos.
Attackers use automated scanning tools that work 24/7. If you’re not finding your exposed infrastructure first, someone else is.
Shadow IT, merger integration, and rapid cloud adoption have created attack surfaces that sprawl beyond any single team’s visibility. You can’t protect what you can’t see.
What I’m Doing About This
At Resiliently.ai, we’re building tools that address these gaps directly — domain exposure monitoring, third-party risk visibility, and cyber risk quantification that speaks the language of business.
Because in 2026, the question isn’t whether you’ll face cyber risk. It’s whether you’ll see it coming.
I write about cyber risk from the intersection of risk engineering and AI automation. These views are mine, not my employer’s.
Get the full picture with premium access
In-depth reports, assessment tools, and weekly risk intelligence for cyber professionals.
Pro Membership
Founding member price — lock it in forever
Unlimited reports + tools + alerts
Subscribe Now →Free NIS2 Compliance Checklist
Get the free 15-point PDF checklist + NIS2 compliance tips in your inbox.
No spam. Unsubscribe anytime. Privacy Policy
Featured
NIS2 Penalties Explained: Essential vs Important Entities and What They Mean for Coverage
8 min read
NIS2 Underwriting Questions: What Every Cyber Insurance Broker Should Ask
14 min read
Agentic Security: What Underwriters Need to Know in 2026
8 min read
The NIS2 Audit Crunch: What Underwriters Need to Know Before June 30, 2026
10 min read
Premium Report
2026 Cyber Risk Landscape Report
24 pages of threat analysis, claims data, and underwriting implications for European cyber insurance.
View Reports →Related posts
Agentic Security: What Underwriters Need to Know in 2026
Autonomous AI agents are entering production at scale — and they bring a completely new attack surface that traditional cyber insurance questionnaires weren't designed to capture.
How AI Is Changing Cyber Risk Assessment
A look at how AI and multi-agent systems are starting to transform the way we evaluate and underwrite cyber risk.
AI in Cyber Underwriting: Attacker, Defender, and Underwriter Perspectives
Exploring how AI transforms cyber risk from three angles: how threat actors weaponize it, how security teams deploy it, and how underwriters must adapt their approach.